We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet.

Most popular related searches

Related articles

As what is largely agreed to be the world’s most dangerous industry, construction site Health and Safety failures constitute potentially severe harm to worker wellbeing, with the capacity to severely impact quality of life or – put bluntly – end it.
Running contrary to this doom-laden approach though, improvements to the industry typically arise from assessing HSE failures and implementing measures to reduce risks and control common hazards. In line with this thinking, in an effort to help...

Lights are the most important components of security systems. Well-lit locations are generally avoided by trespassers, because such areas can disrupt stealthy movements. The isolated nature of far-flung locations, such as military bases, mining sites, agricultural operations and manufacturing plants, can be made secure with solar perimeter lighting, coupled with other security devices.
Remote and Security Capabilities
Solar light towers that are used to enhance security systems in remote locations are...

Preparing for the closure and long-term care of a municipal solid waste landfill (MSWLF) can be an inordinate undertaking. Whether public or private, all landfills eventually reach the end of their active lifecycle. Before closure, a landfill must meet a series of criteria as determined by Subtitle D of the Resource Conservation and Recovery Act (RCRA). Following closure, those same regulations also require a minimum 30-year care period of monitoring and maintaining the landfill after it no longer generates...

Staying safe and being prepared for the unexpected
With lone working on the rise lately a lot of people may be wondering; exactly what constitutes this practice and what are the health & safety requirements?
A lone worker is essentially defined as an employee who works by themselves without direct supervision, perhaps on a remote site, in their own home or on the move. It can be carried out in a variety of occupations with the following being some of the most likely examples:
Site Security guards.
Nurses...

Tiny, biointensive operations show smallholder farmers from around the world how they can grow far more food than conventional approaches.
Her face shaded by a wide-brimmed straw hat, Olawumi Benedict is cheerfully tending to her “little babies” — kale seedlings growing in shallow wooden flats until they’re hardy enough for transplantation into soil beds. Three miles over the hills on another small farm, Jonnes Mlegwah is double-digging the soil with a spading fork, preparing to plant...

Customer comments

No comments were found for DHT-based security infrastructure for trusted internet and grid computing. Be the first to comment!

Add your comment

Great! comment successfully added!

Contact

Your message:

Your email

Your first name

Your last name

I would like to receive periodic email updates and special offers from select suppliers.